Closed jhagberg closed 12 years ago
Well, in general we should stick with the principle of least privilege:
http://en.wikipedia.org/wiki/Principle_of_least_privilege
That means that the second way should be preferred.
Yes I agree. But I am not sure at this moment that it is the best solution.
have you read about this page https://www.irods.org/index.php/Run_server_as_root
About the uppcomming Direct acess vault.
Thanks for the pointer Jonas ! I still think we shouldn't run it as root until we see a crucial need for it.
For now I think we should focus on simple use cases. Please could you have a look at issue #6 and report back ?
Thanks !
12 dec 2011 kl. 13:42 skrev jhagberg:
Yes I agree. But I am not sure at this moment that it is the best solution.
have you read about this page https://www.irods.org/index.php/Run_server_as_root
About the uppcomming Direct acess vault.
Yes I agree. It is always best to not run things as root.
I will have a look.
cheers
Jonas: I liked the way you had figured out, in order to be able to at least read files directly, even though they are inside the vault, but still needing to iput files for any writing. ... then one could implement some functionality for automatically retrieving the physical path to the file, for reading, possibly in some kind of wrapper ,,,
How was is it, did you/we document this setup somewhere?
Hej
Check the internal page. I guess I never had time to finish the setup before I left, so it was still on idea basis, with one practical real life test.
The issues with that solution is that one user have access to a lot of different data since the iRODS user need to be the owner of all the file. If that user is compromised it have access of a lot of important data.
The idea of the direct access vault is I guess that the root user have super power and can simply force the user to not be able to change the files on disk. But still they are the owner of the files. We still have the same problem if the root user get compromised.
if something goes wrong with iRODS we have the same problem if the user are root or if the user is iRODS since we have irods as owner of all files is the same as root in principle.
But if bad code is injected into iRODS the iRODS user can do a lot less damage than the root user. So in that way it is of course better to not run as root.
So in this case it is more cons to run as iRODS user than the cons of using root.
At this point I guess a decision has been taken on this (which user to run on):
https://github.com/UPPMAX/irods/wiki/iRODS-as-super--user-root
Therefore, should we close this ?
Closing
How should we handle direct file access of files that we still want to do be handled by iRODS ?
Should we dig in to iRODS as ROOT
or still try the other way with non root user owning every vault file and fiddling around with sticky bits and separate folders and resources?